References
- B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd ed. New York, NY: John Wiley & Sons, 1996.
- D. E. Goldberg, Genetic Algorithms, in Search, Optimization & Machine Learning. Reading, MA: Addison-Wesley, 2009.
- R. Ghosh, "A modified improved text encryption approach inspired by genetic algorithm techniques using RSA algorithm," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 6, pp. 263-268, Jun. 2012.
- J. Daemen, R. Govaerts, and J. Vandewalle, "Weak keys for IDEA," in Proceedings of the 13th Annual International Cryptology Conference (CRYPTO'93), Santa Barbara, CA, 1994, pp. 224-230.
- P. Hawkes, "Differential-linear weak key classes of IDEA," in Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT'98), Espoo, Finland, 1998, pp. 112-126.
- A. Biryukov, J. Nakahara Jr, B. Preneel, and J. Vandewalle, "New weak-key classes of IDEA," in Proceedings of the 4th International Conference on Information and Communications Security (ICICS2002), Singapore, 2002, pp. 315-326.
- D. H. Zhu, "An attack on 5.5-round IDEA," in Proceedings of the 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS2010), Xiamen, China, 2010, pp 18-21.
- I. A. Abed, "Finding the best key stream by using genetic algorithm for image encryption," Journal of Basrah Researches (Sciences), vol. 36, no. 3, pp. 72-80, Jun. 2010.
- S. Bhowmik and S. Acharyya, "Image cryptography: the genetic algorithm approach," in Proceedings of the 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE2011), Shanghai, China, 2011, pp. 223-227.
- S. Goyat, "Genetic key generation for public key cryptography," International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 3, Jul. 2012.